The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - May/June (2006 vol.4)
pp: 45-51
ABSTRACT
To prevent spam, spyware, and other intrusions, network operators and software providers deploy trusted intermediary technologies to protect their end users and networks. These technologies can be designed to anticipate legal challenges that may be raised by the companies and other actors whose behaviors they inhibit.
INDEX TERMS
spyware, spam, network operations
CITATION
Charles D. Curran, "Combating Spam, Spyware, and Other Desktop Intrusions: Legal Considerations in Operating Trusted Intermediary Technologies", IEEE Security & Privacy, vol.4, no. 3, pp. 45-51, May/June 2006, doi:10.1109/MSP.2006.60
19 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool